This site uses cookie including third parties cookies which helps us provide and improve our services. Find more on our Cookie Policy




We value your time as much as you do, and that is why we have prepared an inspiring and goal-oriented agenda, fortified by wise speakers and educational key notes. Solve your current issues by participating in view-broadening and mind-sharing discussions or benchmark your success against that of your peers. Reactive security is NOT security – only security by design can ensure the success of your digital business. Register now and take the first step for moving ahead!

Time Event Speakers

Registration / 1-1 Meetings & Networking Breakfast


Raffle Draw


Information Security in the Multi-Platform Era

Yeşim Öztürk
Senior Research Analyst, IT Services & Software, IDC Türkiye

Integrated Security View Against Internal and External Threats

Orhan Muratoğlu
Vice President, TÜBİTAK BİLGEM

The Impact of Security on the Business World

Dilek Duman
COO, DenizBank

Panel Discussion: Transition to Strategic Management in Enterprise Security


Mission Possible: Data Security

Yusuf Kuş
Cyber Security Operation Center Project Team Leader, Netaş

From Database Manager to the Board of Directors - Data Security


Continuity of Security

Tuğrul Demiralp
Product and Services Marketing Director, KoçSistem

Cyber security needs have become a continues necessity for corporates, with the increase of end point devices and data intensity. To provide this continuity, systems must be monitored and analyzed 24/7 across all layers.


Next Generation SOC

Burak Dayıoğlu,

Case Study by SailPoint: Identity is Security

Çiğdem Yıldız
Information Security Access Manager, Vodafone

Unknown Flying Threats

Ozan Özkara
Business Development Manager, Platin Bilişim

1-1 Meetings / Networking & IDC CISO Connect Roundtables

  Delegates are invited to attend f acilitated peer to peer discussion groups.


Panel Discussion: Cyber Security in Theory and in Practice


Rethink Cyber Security – Protecting the Human Point

Kaan Kayan
Senior Sales Engineer, Forcepoint

Data Deletion and De-identification

Murat Lostar
Founder, Lostar Bilgi Güvenliği

Case Study by UITSEC: Next Generation Endpoint Application

Yalçın Bekmezci
IT Specialist, Cyber Security, Abdi İbrahim İlaç

Case Study by Infosec: Data Leakage Prevention Methods


Networking Lunch (Parallel Sessions)

Please use the select box below to browse through the sessions.

12:50 - 14:00

Open Discussion with Lunch

Harika Yalaza
Consultant & Board Member, Intertech
Gökhan Bozdoğan
Technology Security Operations Manager, Vodafone
Gökhan Koç
CIO, Further
Bülent Muşlu
SVP, Information Security, IT Compliance and Service Management, Bankalararası Kart Merkezi
Gürhan Özdemir
CISO, Defterhane
Şenol Şahin
IT Service Manager, DHL Express
Cemil Şinasi Türün
Blockchain Evangelist
12:50 - 14:00

Open Discussion with Lunch

Emrah Bayarçelik
Group Manager, IT Infrastructure & Security, IGA
Erdem Alaşehir
Technical Lead, Security Incident Management & Monitoring, QNB Finansbank - IBTech
Semih Gelişli
Manager, IT Security, Yapı Kredi Bankası
Mazhar Karagülle
Managed Security Services Manager, Turkcell
Doç. Dr. Bilgin Metin
Faculty Member, MIS, Bogazici University
Erdinç Tutam
Director, IT Network & Security Management, Borsa Istanbul
Ramazan Çelik
Deputy General Manager, Barikat
12:50 - 14:00

Open Discussion with Lunch

Elif Uslu
Head of Security & Business Continuity, BNP Paribas Cardif
Tulu Akyol
Head of IT Strategy, Governance, Risk & Compliance, ING Bank
Akif Mert Avcı
Manager, Information Security, IT Process and Compliance, Vakıfbank
Ersun Bayraktaroğlu
Department Manager, Risk Group, Information Security Monitoring, ABank
Ahmet Tosunoğlu
CIO, Atasay
Murat Zaralı
Manager, IT Systems Security, Pegasus Airlines
Ekrem Zoroğlu
Group Manager, Solutions Delivery & Operations, Daimler

Security Strategy for Digital Transformation

Sinan Özer
EVP, Infrastructure Development & Maintanance, Yapı Kredi Bankası

What Changed in Endpoint?

Ali Fuat Türkay
EMER Channel Manager, Palo Alto Networks

Secure Digital Parameter Solutions

Alper Soyak
Networking Sales Manager, Citrix Systems

From Simple Hygiene to Advanced Security

Serhat Erkan
Senior Sales Engineer, CyberArk

Case Study by Check Point: Integrated Advanced Threat Prevention for Network, End Point and Mobile

Devrim Kalmaz
Manager, Infrastructure Security Systems, QNB Finansbank/IBTech

Cyber attacks are increasingly able to bypass conventional security products on all platforms. Even seemingly modern technologies have difficulty in blocking many of these attacks. We need highest level of security on all platforms. The solution is a system that is consolidated and that correlates all type of events across all network environment and mobile infrastructure.


Utilizing Endpoint Analytics on Big Data Platforms to Discover Threats

Necati Ertuğrul
CTO, May Siber Teknoloji

Mind the Gap!

Altuğ Yavaş
Senior System Engineer, Infoblox

Self-evolving Expert System: Actionable Threat Intelligence applied to Security Fabric

Melih Kırkgöz
Regional Director, Systems Engineering, Fortinet

Cyber Insurance

Serdar Tüfekçi
Manager, Liability, Aviation and Special Risks, Anadolu Sigorta

Proactive Security Approach

Cem Aslan
Manager, Fixed Enterprise Data, Voice and Security Services, Turkcell

Cyber Intelligence Services

Serkan Akcan
Managing Director, Nebula

Deception-based Threat Detection: Myths and Realities

Ray Kafity
Vice President - Middle East Turkey and Africa, Attivo Networks

In today’s world where advanced threats and insiders demonstrate that they can evade security prevention systems, in-network threat visibility and detection are considered critical security infrastructure. That said, there are myths and realities about the effectiveness of deception for detecting advanced threats – and there are specific strategies for operational management efficiency and key use cases that are driving adoption. Join us for this session where you’ll hear about real-world deployment experiences, the value customers are realizing, and what pen test Red Teams are saying about deception-based threat detection.


Future of Cyber Security

Dr. Cüneyt Kalpakoğlu
Founder & CEO, EndPoint Labs

Panel Discussion: 360° Look at New Generation Security


Türkler ve Güvenlik


Pelin Pirnal

Conference Project Manager

+90 212 3560218

Onur Hamitoglu

Senior Sales Manager

+90 533 3018998

About IDC

54 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit